Abstract
The purpose of this work is to give a service provider or a resource holder the opportunity to evaluate the trustworthiness of each potential client, react to the client’s activity by adapting access policies to the actual risk level, and derive user’s access rights from his previous behavior, recommendations from third party and the actual circumstances. It is supposed that the system is able to observe and to log the activity of each client and use this information to estimate correspondent trust values.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Marsh, S.: Trust and Reliance in Multi-Agent Systems: A Preliminary Report. In: MAA-MAW 1992, 4th European Workshop on Modeling Autonomous Agents in a Multi-Agent World, Rome (1992)
Yahalom, R., Klein, B., Th., B.: Trust Relationships in Secure Systems - a Distributed Authentication Perspective. In: IEEE Symposium on Security and privacy (1993)
Th, B., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: ESCORICS 1994, Brighton, UK (November 1994)
Jøsang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Conference on Electronic Commerce (2002)
Ravichandran, A., Yoon, J.: Trust management with delegation in grouped peer-to-peer communities. In: Proceedings of SACMAT 2006, USA (2006)
Tchepnda, Ch., Riguidel, M.: Distributed Trust Infrastructure and Trust-Security Articulation: Application to Heterogeneous Networks. In: AINA, pp. 33–38 (2006)
Giang, P.D., Hung, L.X., Lee, S., Lee, Y.-K., Lee, H.: A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubi-quitous Systems. In: IEEE MUE (2007)
Chakraborty, S., Ray, I.: TrustBAC - Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems. In: Proceedings of the eleventh ACM symposium on Access control models and technologies, pp. 49–58 (2006)
Krukow, K., Nielsen, M., Sassone, V.: A Framework for Concrete reputation systems with Applications to History-Based Access Control. In: CCS 2005 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Komarova, M., Riguidel, M. (2008). Adjustable Trust Model for Access Control. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_34
Download citation
DOI: https://doi.org/10.1007/978-3-540-69295-9_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69294-2
Online ISBN: 978-3-540-69295-9
eBook Packages: Computer ScienceComputer Science (R0)